Tech Insight: Viral Arms Race Brings New, Better Evasion
Sophisticated threats and APT have become such a focal point of the security industry that we hardly hear about the most common threat facing enterprises — malware in the form of viruses, botnets, and worms. If you listen to the marketing coming from security vendors, you might get the impression that these are issues of the past because everyone is scared of targeted attacks. No one, but antivirus vendors, are talking about how everyday there are thousands of new infections occurring across corporate desktops.
The truth is that talking about defending against everyday, run-of-the-mill malware isn’t sexy and doesn’t sell products. Sticking your head in the sand only exacerbates the problem, however, because these threats are not going away and the malware authors are getting better. The authors keep making malware stealthier and finding new ways to profit on old attacks while we’re doing our best at defending our networks, yet being told by antivirus vendors that they’ve got it covered.
Cryptolocker has been the most recent eye-opener that non-targeted malware is still a real problem for many companies. These same companies who thought they had their corporate data protected by keeping their antivirus products up-to-date are getting hosed by a single user opening up the wrong e-mail attachment. In the case of Cryptolocker, office documents and other file types on the local hard drive and connected network share are now encrypted using public key cryptography. Unless the ransom is paid using Bitcoin or Money, only the malware author can decrypt the files.
The use of public key crypto is only one of the interesting advances in recent iterations of malware like Zeus, Andromeda, Vertexnet, and Cidox. Unlike the Robert Tappan Morris who created the Morris Worm from 25 years ago, today’s malware isn’t part of a failed informal research project. Instead, malware authors are out to make money and to do that they must write resilient, stealthy software. Most of the newly observed techniques are focused on more effective persistence mechanisms, evading analysis by security researchers, and detection by malware sandboxes like Anubis and Cuckoo.
The more basic features are simply clever tricks to help malicious PDFs evade detection so they’re more likely to end up in a user’s inbox where they’ll open and infect their computer. HTTP Host header spoofing has helped malicious traffic look legitimate when the HTTP requests are actually part of the Cidox command and control framework.
But the advances don’t stop there. McAfee has identified several several different pieces of malware that have added new polymorphic capabilities that do more than just modify their binaries a few times a day or each time they’re run. The changes include modification of known data and executable procedures like opcodes for the prologue and epilogue sequences to evade signature-based detection.
According to a recent report from malware analysis appliance vendor, Fireeye, more malware samples are including abilities to defeat file-based sandboxes used to analyze and detect malware. In addition to the typical virtual machine-based detection where malware will change its behavior when running in a virtual machine, new variants are monitoring for human interaction before executing their full malicious payload. Two methods outlined in the Fireeye paper including watching for user clicks and displaying dialog boxes that require a user to click. Once the malware is satisfied a normal user is executing it, then it proceeds to carry out its true purpose.
As we’ve seen with the average malware infection, protection measures shouldn’t stop at just keeping antivirus up-to-date and ensuring backups are working. Defensive capabilities must be layered so that even if one system gets compromised, it does not impact every other system. Going back to traditional security tenets like implementing network segmentation and principal of least privilege can have a significant impact in limiting the damage that an infected machine can do.
The Twenty Critical Security Controls for Effective Cyber Defense published by the SANS Institute is an excellent framework for building the necessary defenses to protect against malware attacks. In addition to malware protections and data recovery capabilities, the Twenty Critical Controls promotes controlled use of administrative privileges, boundary defense, secure network design, secure endpoint configuration, and much more.
One area not covered in detail by the Twenty Critical Controls, but certainly appropriate when discussing the method of propagation for many of today’s malware attacks, is user awareness. It is a touchy subject because many security pundits state that any attempts to educate and train users on security is a lost cause. They say the money is best spent elsewhere but how can that be when desktops and laptops are getting infected even when antivirus, Internet security gateways, and other controls are in place.
User awareness efforts don’t need to be expensive and time consuming in order to be effective. One of the most useful methods is to reinforce common sense computer use such as not opening up attachments from people you weren’t expecting to receive attachments from — such as the more believable phishing messages sourced by the Cutwail botnet that look like legitimate flight and hotel notifications yet contain a malicious attachment.
Have a comment on this story? Please click “Add Your Comment” below. If you’d like to contact Dark Reading’s editors directly, send us a message.